ThePhish
misp-galaxy
Our great sponsors
ThePhish | misp-galaxy | |
---|---|---|
17 | 3 | |
1,005 | 478 | |
- | 2.7% | |
0.0 | 9.8 | |
over 1 year ago | 6 days ago | |
Python | Python | |
GNU Affero General Public License v3.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ThePhish
- How do you deal with phising emails at your company?
- ThePhish: an automated phishing email analysis tool - A new version will come when the Python API for TheHive 5 becomes stable, so stay tuned!
-
ThePhish: an automated phishing email analysis tool
Here is the repo: https://github.com/emalderson/ThePhish
- Show HN: I made an automated phishing email analysis tool called ThePhish
- ThePhish: An automated phishing email analysis tool
-
Create automated email analysis tool
I am curious to start on a cybersecurity project just for fun and to learn more about email analysis. Because at work, we usually do this manually for potential phishing mails like checking the headers, URLs, email content, etc, I was wondering if there is already any existing Github projects/softwares out there to automate this. If none, how feasible is this or what would I have to know prior to deep diving into developing such a tool. I am not asking for source code or anything, just wanna dabble in some blue team projects. I found one here - https://github.com/emalderson/ThePhish but this seems to be quite hardcore and linked to SIEM. I would want like to be able to just check one email at a time.
misp-galaxy
-
Foreign Travel Risks
MISP Threat Actor Galaxy
-
Profiling and Tracking Threat Actors
MISP threat actors galaxy may be of interest: https://github.com/MISP/misp-galaxy
-
Learning about apt groups
https://attack.mitre.org/groups/ this is a solid source. If you want to see the MISP list of threat actors from their service you can look here https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json . The painful thing about this topic is every security vendor has a different naming convention for the threat actors in question.
What are some alternatives?
intelmq - IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
MISP-QRadar-Integration - The Project can be used to integrate QRadar with MISP Threat Sharing Platform
TheHiveDocs - Documentation of TheHive
Watcher - Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Cortex - Cortex: a Powerful Observable Analysis and Active Response Engine
threatbus - 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.
misp-warninglists - Warning lists to inform users of MISP about potential false-positives or other information in indicators
apooxml - Generate YARA rules for OOXML documents.
MISP - MISP (core software) - Open Source Threat Intelligence and Sharing Platform
atc-react - A knowledge base of actionable Incident Response techniques
OTX-Suricata - The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX account.